std: move locks to sys
on teeos
This commit is contained in:
parent
c2d0f8452f
commit
5e343e76e8
8 changed files with 158 additions and 10 deletions
|
@ -5,5 +5,8 @@ cfg_if::cfg_if! {
|
|||
} else if #[cfg(target_os = "solid_asp3")] {
|
||||
mod itron;
|
||||
pub use itron::Condvar;
|
||||
} else if #[cfg(target_os = "teeos")] {
|
||||
mod teeos;
|
||||
pub use teeos::Condvar;
|
||||
}
|
||||
}
|
||||
|
|
|
@ -1,5 +1,8 @@
|
|||
cfg_if::cfg_if! {
|
||||
if #[cfg(all(target_vendor = "fortanix", target_env = "sgx"))] {
|
||||
if #[cfg(target_os = "teeos")] {
|
||||
mod pthread;
|
||||
pub use pthread::{Mutex, raw};
|
||||
} else if #[cfg(all(target_vendor = "fortanix", target_env = "sgx"))] {
|
||||
mod sgx;
|
||||
pub use sgx::Mutex;
|
||||
} else if #[cfg(target_os = "solid_asp3")] {
|
||||
|
|
148
library/std/src/sys/locks/mutex/pthread.rs
Normal file
148
library/std/src/sys/locks/mutex/pthread.rs
Normal file
|
@ -0,0 +1,148 @@
|
|||
use crate::cell::UnsafeCell;
|
||||
use crate::io::Error;
|
||||
use crate::mem::{forget, MaybeUninit};
|
||||
use crate::sys::cvt_nz;
|
||||
use crate::sys_common::lazy_box::{LazyBox, LazyInit};
|
||||
|
||||
struct AllocatedMutex(UnsafeCell<libc::pthread_mutex_t>);
|
||||
|
||||
pub struct Mutex {
|
||||
inner: LazyBox<AllocatedMutex>,
|
||||
}
|
||||
|
||||
#[inline]
|
||||
pub unsafe fn raw(m: &Mutex) -> *mut libc::pthread_mutex_t {
|
||||
m.inner.0.get()
|
||||
}
|
||||
|
||||
unsafe impl Send for AllocatedMutex {}
|
||||
unsafe impl Sync for AllocatedMutex {}
|
||||
|
||||
impl LazyInit for AllocatedMutex {
|
||||
fn init() -> Box<Self> {
|
||||
let mutex = Box::new(AllocatedMutex(UnsafeCell::new(libc::PTHREAD_MUTEX_INITIALIZER)));
|
||||
|
||||
// Issue #33770
|
||||
//
|
||||
// A pthread mutex initialized with PTHREAD_MUTEX_INITIALIZER will have
|
||||
// a type of PTHREAD_MUTEX_DEFAULT, which has undefined behavior if you
|
||||
// try to re-lock it from the same thread when you already hold a lock
|
||||
// (https://pubs.opengroup.org/onlinepubs/9699919799/functions/pthread_mutex_init.html).
|
||||
// This is the case even if PTHREAD_MUTEX_DEFAULT == PTHREAD_MUTEX_NORMAL
|
||||
// (https://github.com/rust-lang/rust/issues/33770#issuecomment-220847521) -- in that
|
||||
// case, `pthread_mutexattr_settype(PTHREAD_MUTEX_DEFAULT)` will of course be the same
|
||||
// as setting it to `PTHREAD_MUTEX_NORMAL`, but not setting any mode will result in
|
||||
// a Mutex where re-locking is UB.
|
||||
//
|
||||
// In practice, glibc takes advantage of this undefined behavior to
|
||||
// implement hardware lock elision, which uses hardware transactional
|
||||
// memory to avoid acquiring the lock. While a transaction is in
|
||||
// progress, the lock appears to be unlocked. This isn't a problem for
|
||||
// other threads since the transactional memory will abort if a conflict
|
||||
// is detected, however no abort is generated when re-locking from the
|
||||
// same thread.
|
||||
//
|
||||
// Since locking the same mutex twice will result in two aliasing &mut
|
||||
// references, we instead create the mutex with type
|
||||
// PTHREAD_MUTEX_NORMAL which is guaranteed to deadlock if we try to
|
||||
// re-lock it from the same thread, thus avoiding undefined behavior.
|
||||
unsafe {
|
||||
let mut attr = MaybeUninit::<libc::pthread_mutexattr_t>::uninit();
|
||||
cvt_nz(libc::pthread_mutexattr_init(attr.as_mut_ptr())).unwrap();
|
||||
let attr = PthreadMutexAttr(&mut attr);
|
||||
cvt_nz(libc::pthread_mutexattr_settype(
|
||||
attr.0.as_mut_ptr(),
|
||||
libc::PTHREAD_MUTEX_NORMAL,
|
||||
))
|
||||
.unwrap();
|
||||
cvt_nz(libc::pthread_mutex_init(mutex.0.get(), attr.0.as_ptr())).unwrap();
|
||||
}
|
||||
|
||||
mutex
|
||||
}
|
||||
|
||||
fn destroy(mutex: Box<Self>) {
|
||||
// We're not allowed to pthread_mutex_destroy a locked mutex,
|
||||
// so check first if it's unlocked.
|
||||
if unsafe { libc::pthread_mutex_trylock(mutex.0.get()) == 0 } {
|
||||
unsafe { libc::pthread_mutex_unlock(mutex.0.get()) };
|
||||
drop(mutex);
|
||||
} else {
|
||||
// The mutex is locked. This happens if a MutexGuard is leaked.
|
||||
// In this case, we just leak the Mutex too.
|
||||
forget(mutex);
|
||||
}
|
||||
}
|
||||
|
||||
fn cancel_init(_: Box<Self>) {
|
||||
// In this case, we can just drop it without any checks,
|
||||
// since it cannot have been locked yet.
|
||||
}
|
||||
}
|
||||
|
||||
impl Drop for AllocatedMutex {
|
||||
#[inline]
|
||||
fn drop(&mut self) {
|
||||
let r = unsafe { libc::pthread_mutex_destroy(self.0.get()) };
|
||||
if cfg!(target_os = "dragonfly") {
|
||||
// On DragonFly pthread_mutex_destroy() returns EINVAL if called on a
|
||||
// mutex that was just initialized with libc::PTHREAD_MUTEX_INITIALIZER.
|
||||
// Once it is used (locked/unlocked) or pthread_mutex_init() is called,
|
||||
// this behaviour no longer occurs.
|
||||
debug_assert!(r == 0 || r == libc::EINVAL);
|
||||
} else {
|
||||
debug_assert_eq!(r, 0);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
impl Mutex {
|
||||
#[inline]
|
||||
pub const fn new() -> Mutex {
|
||||
Mutex { inner: LazyBox::new() }
|
||||
}
|
||||
|
||||
#[inline]
|
||||
pub unsafe fn lock(&self) {
|
||||
#[cold]
|
||||
#[inline(never)]
|
||||
fn fail(r: i32) -> ! {
|
||||
let error = Error::from_raw_os_error(r);
|
||||
panic!("failed to lock mutex: {error}");
|
||||
}
|
||||
|
||||
let r = libc::pthread_mutex_lock(raw(self));
|
||||
// As we set the mutex type to `PTHREAD_MUTEX_NORMAL` above, we expect
|
||||
// the lock call to never fail. Unfortunately however, some platforms
|
||||
// (Solaris) do not conform to the standard, and instead always provide
|
||||
// deadlock detection. How kind of them! Unfortunately that means that
|
||||
// we need to check the error code here. To save us from UB on other
|
||||
// less well-behaved platforms in the future, we do it even on "good"
|
||||
// platforms like macOS. See #120147 for more context.
|
||||
if r != 0 {
|
||||
fail(r)
|
||||
}
|
||||
}
|
||||
|
||||
#[inline]
|
||||
pub unsafe fn unlock(&self) {
|
||||
let r = libc::pthread_mutex_unlock(raw(self));
|
||||
debug_assert_eq!(r, 0);
|
||||
}
|
||||
|
||||
#[inline]
|
||||
pub unsafe fn try_lock(&self) -> bool {
|
||||
libc::pthread_mutex_trylock(raw(self)) == 0
|
||||
}
|
||||
}
|
||||
|
||||
pub(super) struct PthreadMutexAttr<'a>(pub &'a mut MaybeUninit<libc::pthread_mutexattr_t>);
|
||||
|
||||
impl Drop for PthreadMutexAttr<'_> {
|
||||
fn drop(&mut self) {
|
||||
unsafe {
|
||||
let result = libc::pthread_mutexattr_destroy(self.0.as_mut_ptr());
|
||||
debug_assert_eq!(result, 0);
|
||||
}
|
||||
}
|
||||
}
|
|
@ -5,5 +5,8 @@ cfg_if::cfg_if! {
|
|||
} else if #[cfg(target_os = "solid_asp3")] {
|
||||
mod solid;
|
||||
pub use solid::RwLock;
|
||||
} else if #[cfg(target_os = "teeos")] {
|
||||
mod teeos;
|
||||
pub use teeos::RwLock;
|
||||
}
|
||||
}
|
||||
|
|
|
@ -1,8 +0,0 @@
|
|||
pub mod condvar;
|
||||
#[path = "../../unix/locks/pthread_mutex.rs"]
|
||||
pub mod mutex;
|
||||
pub mod rwlock;
|
||||
|
||||
pub(crate) use condvar::Condvar;
|
||||
pub(crate) use mutex::Mutex;
|
||||
pub(crate) use rwlock::RwLock;
|
|
@ -13,7 +13,6 @@ pub mod alloc;
|
|||
pub mod args;
|
||||
#[path = "../unsupported/env.rs"]
|
||||
pub mod env;
|
||||
pub mod locks;
|
||||
//pub mod fd;
|
||||
#[path = "../unsupported/fs.rs"]
|
||||
pub mod fs;
|
||||
|
|
Loading…
Add table
Reference in a new issue